Abstract
This work studies the pollution attack: a challenging security-related problem in peer-to-peer streaming platforms. Different variations of this attack and its combinations are addressed. In order to mitigate such attacks, two different strategies have been proposed in the context of the P2PSP live streaming system, a peer-to-peer streaming platform with free access (i.e. it is not necessary to provide an identification and only endpoints are stored). The first prevention strategy is based on the existence of anonymous trusted peers that detect and report attackers, which are finally expelled. The second strategy increases the security level in the overlay at the cost of a higher computation and communication overhead. Both strategies are analyzed theoretically for several attack configurations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bellovin, S.M.: Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Commun. Rev. 19(2), 32–48 (1989)
Conner, W., Nahrstedt, K.: Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: Proceedings of the 4th on Middleware Doctoral Symposium, p. 13. ACM (2007)
Conrad, M.: Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic markets. In: Proceedings of the 2006 ACM CoNEXT Conference, CoNEXT ’06, pp. 30:1–30:2. ACM, New York, NY, USA (2006)
Dai, W.: Speed Comparison of Popular Crypto Algorithms. http://www.cryptopp.com/benchmarks.html
Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IP-TV, pp. 323–328. ACM (2007)
Gouda, M.G.: Keynote talk: communication without repudiation: the unanswered question. In: Networked Systems, pp. 1–8. Springer (2014)
Hu, Bo., Zhao, H.V.: Pollution-resistant peer-to-peer live streaming using trust management. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp. 3057–3060, Nov 2009
Xin, K., Wu, Y.: A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput. Netw. 72, 62–73 (2014)
Lin, W.S., Zhao, H.V., Liu, K.J.R.: Attack-resistant collaboration in wireless video streaming social networks. In: 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1–4. IEEE (2010)
Cigno, R.L., Russo, A., Carra, D.: On some fundamental properties of P2P push/pull protocols. In: ICCE 2008 Second International Conference on Communications and Electronics, pp. 67–73. IEEE (2008)
Magharei, N., Rejaie, R.: Understanding mesh-based peer-to-peer streaming. In: Proceedings of the 2006 international Workshop on Network and Operating Systems Support for Digital Audio and Video, p. 10. ACM (2006)
Marti, S., Garcia-Molina, H.: Identity crisis: anonymity vs reputation in P2P systems. In: Proceedings of Third International Conference on Peer-to-Peer Computing, (P2P 2003). pp. 134–141. IEEE (2003)
Medina-López, C., García-Ortiz, J.P., Naranjo, J.A.M., Casado, L.G., González-Ruiz, V.: IPTV using P2PSP and HTML5+WebRTC. In: The Fourth W3C Web and TV Workshop. Munich, Germany, March 2014
Medina-López, C., Naranjo, J.A.M., García-Ortiz, J.P., Casado, L.G., González-Ruiz, V.: Execution of the P2PSP protocol in parallel environments. In: Guillermo Botella y Alberto A. Del Barrio Garcia, editor, Actas XXIV Jornadas de Paralelismo (http://www.congresocedi.es/images/site/actas/ActasParalelismo.pdf), pp. 216–221. Madrid, Septiembre 2013
Liu, Y., Yang, S., Guo, L., Chen, W., Guo, L.: A distributed trust-based reputation model in p2p system. In: 2007 Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, vol. 1, pp. 294–299, July 2007
Salama, P., Shroff, N.B., Coyle, E.J., Delp, E.J.: Error concealment techniques for encoded video streams. In: International Conference on Image Processing, vol. 1, pp. 9–9. IEEE Computer Society (1995)
P2PSP Team. Peer to Peer Straightforward Protocol. http://p2psp.org/en/p2psp-protocol
Vieira, A.B., Campos, S., Almeida, J.: Fighting attacks in P2P live streaming. simpler is better. In: IEEE INFOCOM Workshops 2009, pp. 1–2. IEEE (2009)
Acknowledgments
This work has been funded by grants from the Spanish Ministry (TIN2012-37483) and Junta de Andalucía (P11-TIC-7176), in part financed by the European Regional Development Fund (ERDF).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Medina-López, C., Casado, L.G., González-Ruiz, V. (2015). Pollution Attacks Detection in the P2PSP Live Streaming System. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds) International Joint Conference. CISIS 2015. Advances in Intelligent Systems and Computing, vol 369. Springer, Cham. https://doi.org/10.1007/978-3-319-19713-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-19713-5_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19712-8
Online ISBN: 978-3-319-19713-5
eBook Packages: EngineeringEngineering (R0)